Apache Struts 2 struts2-rest-showcase orders 'clientName' Parameter Persistent XSS

medium Nessus Plugin ID 60095

Synopsis

A remote web application is affected by a persistent cross-site scripting vulnerability.

Description

The remote web server hosts Struts2-rest-showcase, a demonstration application for the Struts 2 framework. Input passed via the 'clientName' parameter to the orders page is not properly sanitized, which can allow for arbitrary HTML and script code to be loaded onto the system and executed when a user visits the orders page.

Solution

Remove or restrict access to the Struts2-rest-showcase application.

See Also

http://secpod.org/blog/?p=450

http://www.nessus.org/u?d16eaf1b

Plugin Details

Severity: Medium

ID: 60095

File Name: struts_rest_showcase_xss.nasl

Version: 1.10

Type: remote

Published: 7/23/2012

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.8

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:apache:struts

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: true

Exploit Ease: No exploit is required

Vulnerability Publication Date: 2/1/2012

Reference Information

CVE: CVE-2012-1006

BID: 51902

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990